Ch2 Crypto6e
Ch2 Crypto6e
Security
Classical Encryption
Techniques
Symmetric Encryption
• Also referred to as conventional encryption or
single-key encryption
• Was the only type of encryption in use prior to
the development of public-key encryption in
the 1970s
• Remains by far the most widely used of the
two types of encryption
Basic Terminology
• Plaintext
• The original message • Cryptographic system or
cipher
• Ciphertext • Schemes used for
• The coded message encryption
• Enciphering or encryption • Cryptanalysis
• Process of converting from
• Techniques used for
plaintext to ciphertext
deciphering a message
• Deciphering or decryption without any knowledge
• Restoring the plaintext from of the enciphering details
the ciphertext
• Cryptology
• Cryptography • Areas of cryptography
• Study of encryption
and cryptanalysis
Simplified Model of
Symmetric Encryption
Model of Symmetric
Cryptosystem
Cryptographic Systems
• Characterized along three independent dimensions:
Symmetric,
single-key, secret-
Substitution Block cipher
key, conventional
encryption
Asymmetric, two-
Transposition key, or public-key Stream cipher
encryption
Cryptanalysis and
Brute-Force Attack
Cryptanalysis Brute-force attack
• Attack relies on the • Attacker tries every
nature of the possible key on a
algorithm plus some piece of ciphertext
knowledge of the until an intelligible
general translation into
characteristics of the plaintext is obtained
plaintext • On average, half of
• Attack exploits the
all possible keys
characteristics of the must be tried to
algorithm to attempt achieve success
to deduce a specific
plaintext or to
deduce the key being
used
Encryption Scheme Security
• Unconditionally secure
• No matter how much time an opponent has, it is
impossible for him or her to decrypt the
ciphertext simply because the required
information is not there
• Computationally secure
• The cost of breaking the cipher exceeds the value
of the encrypted information
• The time required to break the cipher exceeds
the useful lifetime of the information
Brute-Force Attack
Involves trying every possible key until an intelligible
translation of the ciphertext into plaintext is
obtained
• A shift may be of any amount, so that the general Caesar algorithm is:
C = E(k , p ) = (p + k ) mod 26
• Where k takes on a value in the range 1 to 25; the decryption
algorithm is simply:
p = D(k , C ) = (C - k ) mod 26
Brute-Force
Cryptanalysis of
Caesar Cipher
• Trigram
• Three-letter combination
• Most frequent is the
Playfair Cipher
• Best-known multiple-letter encryption cipher
key: deceptivedeceptivedeceptive
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGRZGVTWAVZHCQYGLMGJ
Vigenère Autokey System
• A keyword is concatenated with the plaintext
itself to provide a running key
• Example:
key: deceptivewearediscoveredsav
plaintext: wearediscoveredsaveyourself
ciphertext: ZICVTWQNGKZEIIGASXSTSLVVWLA
• Even this scheme is vulnerable to cryptanalysis
• Because the key and the plaintext share the same
frequency distribution of letters, a statistical
technique can be applied
Vernam Cipher
One-Time Pad
• Improvement to Vernam cipher proposed by an Army Signal Corp
officer, Joseph Mauborgne
• Use a random key that is as long as the message so that the key
need not be repeated
• Key is used to encrypt and decrypt a single message and then is
discarded
• Each new message requires a new key of the same length as the
new message
• Scheme is unbreakable
• Produces random output that bears no statistical relationship to
the plaintext
• Because the ciphertext contains no information whatsoever about
the plaintext, there is simply no way to break the code
Difficulties
• The one-time pad offers complete security but, in practice, has
two fundamental difficulties:
• There is the practical problem of making large quantities of
random keys
• Any heavily used system might require millions of random
characters on a regular basis
• Mammoth key distribution problem
• For every message to be sent, a key of equal length is needed by
both sender and receiver
• Steganography
Assignment-1
Students must work individual to prepare a poster on a topic in
network security. Students must choose a topic in
networking (examples from past years include Voice over IP, Vehicular
Networks, text messaging, etc.), clearly state
a security property that is important to that application, and either (a)
present a protocol that guarantees that
security property, or (b) present an attack on the application that
breaks the security property.
Protocols and attacks need not be original; students are welcome to
present attacks or protocols that were
published at technical conferences or that appear in Internet
Standards.